The Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 and earlier in Ultra Shareware Ultra Office Control allows remote attackers to force the download of arbitrary files onto a client system via a URL in the first argument to the Open method, in conjunction with a full destination pathname in the first argument (SaveAsDocument argument) to the Save method.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/6319 | exploit |
http://securityreason.com/securityalert/4201 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44750 | vdb entry |
http://secunia.com/advisories/31632 | third party advisory vendor advisory |
http://www.shinnai.net/xplits/TXT_NPku7jFjRufaz85U6Lxn.html | url repurposed exploit |
http://www.shinnai.net/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1219827906.ff.php | url repurposed |
http://www.securityfocus.com/bid/30863 | vdb entry |